Results 1 to 10 of about 6,315,248 (307)
Information Efficiency and Financial Stability [PDF]
AbstractThe authors study a simple model of an asset market with informed and non-informed agents. In the absence of non-informed agents, the market becomes information efficient when the number of traders with different private information is large enough.
Caccioli, Fabio, Marsili, Matteo
openaire +9 more sources
Impacts and Losses Caused By the Fraudulent and Manipulated Financial Information on Economic Decisions [PDF]
Nowadays the effects of the fraudulent and manipulated financial information have been more controversial. We should take into consideration that the financial losses caused by fraudulent or manipulated financial information are remarkable.
Tak ISA
doaj +3 more sources
High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song +2 more
doaj +1 more source
Falcon is one of the promising digital-signature algorithms in NIST’s ongoing Post-Quantum Cryptography (PQC) standardization finalist. Computational efficiency regarding software and hardware is also the main criteria for PQC standardization.
Youngbeom Kim +2 more
doaj +1 more source
Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU [PDF]
In cryptosystems and cryptographic modules, insufficient entropy of the noise sources that serve as the input into random number generator (RNG) may cause serious damage, such as compromising private keys.
Yewon Kim, Yongjin Yeom
doaj +2 more sources
With the recent development of artificial intelligence (AI), efforts to apply related technologies to various fields are rapidly increasing. In the field of cryptanalysis, research utilizing deep learning is continuously being published in order to keep ...
Seonghyuck Lim +2 more
doaj +1 more source
Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation
Recently, as deep learning has been applied to various fields, deep-learning-based side-channel analysis (SCA) has been widely investigated. Unlike traditional SCA, it can perform well independently of the attacker’s ability.
Ji-Eun Woo, Jaeseung Han, Dong-Guk Han
doaj +1 more source
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim +2 more
doaj +1 more source
Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation
The substitution box (S-box) is one of the major components of cryptographic algorithms. An important issue for cryptographic algorithm designers in ensuring sufficient security from linear cryptanalysis, one of the most powerful attacks, is finding an S-
Giyoon Kim, Yongjin Jeon, Jongsung Kim
doaj +1 more source
Generating Cryptographic S-Boxes Using the Reinforcement Learning
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim +4 more
doaj +1 more source

